Privilege Escalation in Active Directory

Comprehensive guide to Privilege Escalation techniques in Active Directory environments, including various methods attackers use to gain higher levels of access and permissions within a compromised network.
Kerberoasting

Exploit service accounts with Service Principal Names (SPNs) to obtain and crack their password hashes.
Rubeus
Impacket's GetUserSPNs.py
PowerView
AS-REP Roasting

Exploit accounts with 'Do not require Kerberos preauthentication' enabled to obtain crackable password hashes.
Rubeus
Impacket's GetNPUsers.py
ASREPRoast
DCSync Attack

Abuse domain replication privileges to retrieve password hashes from Domain Controllers.
Mimikatz
Impacket's secretsdump.py
DSInternals
Token Impersonation

Steal and use access tokens to impersonate other users or processes with higher privileges.
Incognito
Mimikatz
TokenManipulation.ps1
GPO Abuse

Exploit misconfigured Group Policy Objects to escalate privileges across the domain.
PowerView
SharpGPOAbuse
Group Policy Management Console
Constrained Delegation Abuse

Exploit misconfigured Kerberos constrained delegation to impersonate users and gain unauthorized access.
Rubeus
PowerView
ADExplorer
Resource-Based Constrained Delegation

Abuse resource-based constrained delegation to escalate privileges by modifying computer objects.
Rubeus
PowerView
ADExplorer
DnsAdmins Group Abuse

Exploit membership in the DnsAdmins group to load a malicious DLL and gain SYSTEM privileges on a Domain Controller.
dnscmd
Custom malicious DLL
PowerShell
ACL Abuse

Exploit misconfigured Access Control Lists (ACLs) on AD objects to gain unauthorized permissions.
PowerView
BloodHound
ADExplorer
LAPS Abuse

Exploit misconfigurations in Local Administrator Password Solution (LAPS) to obtain local admin passwords.
LAPSToolkit
PowerView
AdmPwd.PS
MS Exchange Abuse

Exploit Exchange server privileges to gain Domain Admin rights or access to sensitive mailboxes.
PowerShell
MailSniper
Ruler
Print Spooler Service Abuse

Exploit vulnerabilities in the Print Spooler service to escalate privileges on domain-joined machines.
PrintNightmare exploits
Mimikatz
PowerShell scripts
Defending Against Privilege Escalation
While understanding privilege escalation techniques is crucial for security assessments, it's equally important to implement strong defensive measures. Here are some key strategies to protect your Active Directory environment against privilege escalation attempts:
- Implement the principle of least privilege for user and service accounts
- Regularly audit and monitor changes to critical Active Directory objects and ACLs
- Use Protected Users security group for privileged accounts
- Implement and maintain a robust patch management process
- Utilize Advanced Threat Analytics (ATA) or Azure Advanced Threat Protection (ATP) for anomaly detection
- Implement strong password policies and enforce multi-factor authentication
- Regularly rotate KRBTGT account password and other critical service account passwords
- Monitor and alert on suspicious changes to Group Policy Objects
- Implement Just-In-Time (JIT) and Just-Enough-Administration (JEA) practices
- Use Privileged Access Workstations (PAWs) for administrative tasks
- Implement and maintain an incident response plan for privilege escalation scenarios
- Regularly conduct security assessments and penetration tests to identify potential vulnerabilities
- Monitor for unauthorized changes to Service Principal Names (SPNs) and Kerberos delegations
- Implement strict controls on domain controller access and management
- Use Microsoft Local Administrator Password Solution (LAPS) to manage local admin passwords
- Regularly review and clean up dormant accounts and stale objects in Active Directory
- Implement network segmentation to limit the impact of compromised credentials
- Use Windows Defender Credential Guard to protect against credential theft and reuse
- Implement and maintain a comprehensive security information and event management (SIEM) solution
- Conduct regular security awareness training for all users, especially those with elevated privileges
For more detailed information on defending against these techniques and implementing a robust Active Directory security strategy, visit our Defensive Techniques page.